Elisity supports simple API connectivity to Palo Alto Networks IoT Security as a method to enrich IT, IoT, IoMT and OT device discovery and identity. This allows data from Palo Alto Networks IoT Security to be pulled into IdentityGraph for use as Core Effective Attributes when creating policies, enhancing the precision and accuracy of device classification and Policy Group matching.
Prerequisites
- API Path (Provided by Palo Alto Networks)
-
Customer ID (Provided by Palo Alto Networks)
- Key ID (Generated in IoT Security)
- Access Key (Generated in IoT Security)
Steps to Connect Palo Alto Networks IoT Security
Palo Alto Networks API Instructions
1. Create an API User in IoT Security by logging into Palo Alto Networks IoT Security and navigating to Preferences under your User Name. In the User Role & Access section find the API Access Key and next to it click Create.
A notification about the access key will be displayed, simply select Create again.
Another notification will pop up with details about the newly generated API Key information however the Access Key will be obfuscated for security reasons. Select Download to retrieve the Key ID and Access Key securely.
2. Log into Elisity Cloud Control Center and navigate to Settings > Connectors and select + Add Connector button.
3. A list of tiles will slide out from the right side of the screen. Select configure on the Palo Alto Networks IoT Security.
4. Input the API Path, Customer ID, and the newly generated Key ID and Access Key and select Submit.
5. If all of the required connector values are correct, all checks will pass and the connector will be created.
After successful configuration, you should begin to see devices enriched by Palo Alto Networks IoT Security in IdentityGraph.
Leveraging Palo Alto Networks IoT Security with Elisity
When Elisity discovers a new asset on the network and the Palo Alto Networks IoT Security connector is active, Cloud Control Center queries the IoT Security platform via API for additional device attributes in order to enrich IdentityGraph. This enriched data is displayed in the IdentityGraph tab of the device and can be leveraged as Elisity Core Effective Attributes for Policy Group definition.
To learn more about how to leverage IdentityGraph Core Effective Attributes review the IdentityGraph article.
If a device discovered by Elisity is also known in Palo Alto Networks IoT Security, the Trust Attribute flag for "Known in Palo Alto IoT Security" will be set to Yes. You can then leverage this trust attribute as match criteria in Policy Group definition.
To learn more about how to leverage IdentityGraph Trust Attributes review the Leveraging Trust Attributes for Policy Group Definition article.